Skip to main content

Making Picnic Feasible for Embedded Devices

  • Conference paper
  • First Online:
Computer Security (ESORICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12580))

Included in the following conference series:

  • 788 Accesses

Abstract

Picnic is a post-quantum digital signature scheme, where the security is based on the difficulty of inverting a symmetric block cipher and zero-knowledge proofs. Picnic is one of the alternate candidates of the third round of the standardization process. Hence, it could be standardized in case of any weakness found in the round three candidates. Based on our paper at the 23rd Euromicro Conference ([6]), we found an optimization, which reduces memory usage to make it usable on IoT devices. This paper focusses on approaches for the implementation of this optimization. As a proof-of-concept, we implemented our implementation of Picnic on a ST Nucleo-L476RG and measured the cycles of the implementation.

Supported by Infineon Technologies Austria AG.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T., Zohner, M.: Ciphers for MPC and FHE. Cryptology ePrint Archive, Report 2016/687 (2016). https://eprint.iacr.org/2016/687

  2. Chase, M., et al.: Post-quantum zero-knowledge and signatures from symmetric-key primitives. Cryptology ePrint Archive, Report 2017/279 (2017). https://eprint.iacr.org/2017/279

  3. Chase, M., et al.: The picnic signature algorithm: Specification version 2.1, 2019. 20 Aug 2019

    Google Scholar 

  4. National Institute of Standards and Technology. Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016). https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf

  5. Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science (1994). https://doi.org/10.1109/SFCS.1994.365700

  6. Winkler, J., Höller, A., Steger, C.: Optimizing picnic for limited memory resources. In: 23rd Euromicro Conference on Digital System Design (DSD) (2020)

    Google Scholar 

  7. Dinur, I., Kales, D., Promitzer, A., Ramacher, S., Rechberger, C.: Linear equivalence of block ciphers with partial non-linear layers: application to LowMC. Cryptology ePrint Archive, Report 2018/772 (2018). https://eprint.iacr.org/2018/772

  8. Kales, D., Perrin, L., Promitzer, A., Ramacher, S., Rechberger, C.: Improvements to the linear operations of LowMC: a faster Picnic. Cryptology ePrint Archive, Report 2017/1148 (2017). https://eprint.iacr.org/2017/1148

Download references

Acknowledgment

This work was supported by the FutureTPM project of Horizon H2020 Framework Programme of the European Union, under GA number 779391.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Johannes Winkler , Andreas Wallner or Christian Steger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Winkler, J., Wallner, A., Steger, C. (2020). Making Picnic Feasible for Embedded Devices. In: Boureanu, I., et al. Computer Security. ESORICS 2020. Lecture Notes in Computer Science(), vol 12580. Springer, Cham. https://doi.org/10.1007/978-3-030-66504-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66504-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66503-6

  • Online ISBN: 978-3-030-66504-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics